#hashes

ionchovy :shrimpred:ionchy@types.pl
2026-02-11
2026-01-20

@Wrewdison tagging #hashes to filter out the timeline based on tags.

Testing #aardvark version 0.10.0 , showing tagging by using # hashes to filter out the timeline.
Ars Technica Newsarstechnica@c.im
2026-01-16

Mandiant releases rainbow table that cracks weak admin password in 12 hours arstechni.ca/Ukpp #passwordcracking #Security #Biz&IT #hashes #ntlm

Inautiloinautilo
2025-11-23


Oops, my UUIDs collided! · How Universally Unique Identifiers can collide ilo.im/1682w2

_____

N-gated Hacker Newsngate
2025-11-16

🎉 Wow, who knew needed another layer of complexity? Enter , where you can now enjoy the thrill of pulling hash-pinned packages and living in fear of , all while pretending your deployments are suddenly faster. 🚀 Because nothing says "cutting-edge" like making your life an even bigger nightmare. 😜
flox.dev/kubernetes/

N-gated Hacker Newsngate
2025-09-24

🎩🧐 Oh, brilliant! Let's a relational with a system because, who needs sanity, right? 😂 Just imagine querying your data with hashes—what could possibly go wrong? 🤦‍♂️
devcenter.upsun.com/posts/why-

Schneier on Security RSSSchneier_rss@burn.capital
2025-09-09

New Cryptanalysis of the Fiat-Shamir Protocol

A couple of months ago, a new paper demonstrated some new attacks against the Fiat-Shamir transformation. Quanta published a <a href="quantamagazine.org/computer-sc... schneier.com/blog/archives/202

#academicpapers #Uncategorized #cryptanalysis #protocols #hashes

Inautiloinautilo
2025-02-18


Hash functions deep dive · Demystifying a key concept for developers ilo.im/162eh5

_____

2024-12-31

Flagg and I have published our write up on how we solved the $1,000 Holiday #Puzzle hosted by #hashkiller. A shout out to #Hashes and #freeroute from #HK for putting this on.

This puzzle was unique, and at times gave us a run for our money, but persistence and teamwork ultimately paid off.

github.com/cyclone-github/writ

#hashcracking #ctf #cyclone #flagg

Schneier on Security RSSSchneier_rss@burn.capital
2024-11-15

Good Essay on the History of Bad Password Policies

Stuart Schechter makes some good points on the history of bad password policies:
Morris and Thompson’s work brought much-needed data to highlight a problem ... schneier.com/blog/archives/202

#historyofsecurity #Uncategorized #passwords #hashes

Radio AzureusRadioAzureus
2024-10-23

@jonny @josephcox
Thank you for this link. I love the series


Podcast link displayed in Antenna Pod 📶 my  podcast client
2024-08-16

Verify Your Downloads Like a PRO!

spectra.video/w/x2zf4wQhBtycdk

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2024-02-19

(3/7)

Rainbow tables for LM #hashes are provided for f#ree by the #developers By default, Ophcrack is #BundledDonations with tables that allow it to crack passwords no longer than 14 characters using only alphanumeric characters. Available for free download are four #WindowsXP tables and four #WindowsVista tables.

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2024-02-19

#Rainbowtables are #precomputed tables of #hashes used to #crack #passwords #Ophcrack is a free open-source #program that uses rainbow tables to crack #Windows log-in passwords. It can import hashes from a variety of formats, including dumping directly from the #SAM files of Windows, and can be run via the #commandline or using the program’s #gui

(1/7)

#itnostalgia

Christos Argyropoulos MD, PhDChristosArgyrop@mstdn.science
2024-02-11

It is mind-blowing that large linear systems show up in the methodology for construction of perfect #hashes and that "randomization" (effectively simple #montecarlo) was used to come up with hashing functions for fixed sets. The number of use cases of #linearalgebra is unreal.

:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified:zodmagus@infosec.exchange
2023-09-07
2023-07-07

@Juro With #single-#use #cryptographic #hashes, we could still enable somewhat strong #anonymity together with strong human id #verification.

Learning from India’s Aadhar system, it is clear that a single #token isn’t good enough.

Perhaps something similar to blockchain, where you can mine some tokens that identify you. And you can throw away like wallets to escape tracking when you need to.

Martin Boller :debian: :tux: :freebsd: :windows: :mastodon:itisiboller@infosec.exchange
2023-06-28

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst